🚨 BREAKING

CVE-2026-43992: JunoClaw AI Exposes BIP-39 Seeds in Tool Calls

CVE-2026-43992: JunoClaw AI Exposes BIP-39 Seeds in Tool Calls

The National Vulnerability Database has disclosed CVE-2026-43992, a critical vulnerability in JunoClaw, an agentic AI platform built on Juno Network. Prior to version 0.x.y-security-1, JunoClaw’s Master Control Program (MCP) write tools — including send_tokens, execute_contract, and ibc_transfer — explicitly accepted mnemonic: string as a parameter. This design flaw meant that BIP-39 seeds were directly embedded within LLM tool-call JSON.

This exposure allows the BIP-39 seed to be transmitted across any transport layer, logged, or captured via telemetry services between the LLM provider and the MCP process. Such an uncontrolled disclosure of cryptographic seeds represents a catastrophic security failure, granting potential attackers complete control over associated assets. The National Vulnerability Database assigns this a CVSS score of 9.8 (CRITICAL), highlighting the severe implications for confidentiality, integrity, and availability.

The vulnerability has been addressed in JunoClaw version 0.x.y-security-1. Organizations leveraging JunoClaw must prioritize immediate patching. The broad attack surface — encompassing transport, logging, and telemetry — means that merely monitoring for exploitation might be insufficient; proactive remediation is the only viable path to mitigate this risk.

What This Means For You

  • If your organization uses JunoClaw, you must immediately verify your version and patch to 0.x.y-security-1 or later. This isn't theoretical; a BIP-39 seed compromise means total loss of control over associated wallets and contracts. Audit all logs and telemetry for any mnemonic string exposure, especially for tools like `send_tokens` or `execute_contract`.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

critical T1537 Defense Evasion

CVE-2026-43992: JunoClaw AI Exposed BIP-39 Seed in Tool Call

Sigma YAML — free preview
title: CVE-2026-43992: JunoClaw AI Exposed BIP-39 Seed in Tool Call
id: scw-2026-05-12-ai-1
status: experimental
level: critical
description: |
  Detects the presence of the 'mnemonic: string' parameter within command lines, which is indicative of JunoClaw AI versions prior to 0.x.y-security-1 exposing BIP-39 seeds in tool calls. This is a critical vulnerability as it directly exposes sensitive private key material.
author: SCW Feed Engine (AI-generated)
date: 2026-05-12
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-43992/
tags:
  - attack.defense_evasion
  - attack.t1537
logsource:
    category: process_creation
detection:
  selection:
      CommandLine|contains:
          - 'mnemonic: string'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-43992 Information Disclosure JunoClaw agentic AI platform prior to version 0.x.y-security-1
CVE-2026-43992 Information Disclosure MCP write tools (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer) in JunoClaw
CVE-2026-43992 Information Disclosure Exposure of BIP-39 seed via 'mnemonic: string' parameter in LLM tool-call JSON
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 12, 2026 at 20:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

Fortinet FortiAuthenticator Critical Improper Access Control Vulnerability

CVE-2026-44277 — A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to...

vulnerabilityCVEcriticalhigh-severityimproper-access-controlcwe-284
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 4 IOCs /⚙ 3 Sigma

Pingvin Share X Critical 2FA Bypass (CVE-2026-44196)

CVE-2026-44196 — Pingvin Share X is a secure and easy self-hosted file sharing platform. From 1.14.1 to 1.16.2, a critical authentication bypass vulnerability allows an...

vulnerabilityCVEcriticalhigh-severityauthentication-bypasscwe-287cwe-697
/SCW Vulnerability Desk /CRITICAL /9.1 /⚑ 2 IOCs /⚙ 2 Sigma

Cleanuparr CVE-2026-44183: Critical RCE via X-Forwarded-For Header Spoofing

CVE-2026-44183 — Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior...

vulnerabilityCVEcriticalhigh-severitycwe-290cwe-348
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 3 IOCs /⚙ 2 Sigma